Our title is itself a book's and the first sentence, see that after the comma, is in its front flap by journalist Scott Rosenberg. Let's take some more words from it and share here. Blogging brought the Web's native character into focus---convivial, expressive, democratic. Bloggers have become the curators of our collective experience, testing out their ideas in front of a crowd and linking people in ways that broadcasts can't match. Blogs have created a new kind of public sphere--one in which we can think out loud together. The preceding paragraph is all in the book flap, front and back. It is the simplest answer if somebody is asking what a blog is, then and now. Although we see that as the magnanimous purpose of a blog which is really enticing and challenging. It adds choices and rooms for both sources and audiences without the regular prescriptive cadence. What's common is the responsibility. Whether or not we do it via blog, print and online news, and whoever
Not fine, solved, okay but the correct term, maybe, on IP version 4 security is, mitigated. Isn't it safer to say that way?
While working on our presentation slides to be delivered next week to one of the computing organization's cyber security event in the country, I connected my computer to the Internet to look for claims, that IP cannot provide 100% guaranteed security, at least for now, it may also be forever, particularly on matters that concerns politics -maybe the toughest concern ever, maybe national infrastructure too, high-profile individual and organizations and more.
They developed the Internet Protocol version 4 without considering security in the design [and the myth that the Internet protocols were designed for warfare environments, CPNI, 2008].
According to the report, in page 5, "As a result, any system built in the future according to the TCP/IP specifications might reincarnate security flaws that have already hit our communication systems in the past. Producing a secure TCP/IP implementation nowadays is a very difficult task partly because of no single document that can serve as a security roadmap for the protocols."
The document, Security Assessment of the Internet Protocol version 4, can be downloaded from CPNI Website which is also seconded by an Internet-Draft from the IETF Website, still fresh and submitted just a week ago.
While working on our presentation slides to be delivered next week to one of the computing organization's cyber security event in the country, I connected my computer to the Internet to look for claims, that IP cannot provide 100% guaranteed security, at least for now, it may also be forever, particularly on matters that concerns politics -maybe the toughest concern ever, maybe national infrastructure too, high-profile individual and organizations and more.
They developed the Internet Protocol version 4 without considering security in the design [and the myth that the Internet protocols were designed for warfare environments, CPNI, 2008].
According to the report, in page 5, "As a result, any system built in the future according to the TCP/IP specifications might reincarnate security flaws that have already hit our communication systems in the past. Producing a secure TCP/IP implementation nowadays is a very difficult task partly because of no single document that can serve as a security roadmap for the protocols."
The document, Security Assessment of the Internet Protocol version 4, can be downloaded from CPNI Website which is also seconded by an Internet-Draft from the IETF Website, still fresh and submitted just a week ago.
Comments